Sciweavers

777 search results - page 44 / 156
» Secure broadcasting in large networks
Sort
View
PAKDD
2010
ACM
128views Data Mining» more  PAKDD 2010»
15 years 2 months ago
Privacy-Preserving Network Aggregation
Abstract. Consider the scenario where information about a large network is distributed across several different parties or commercial entities. Intuitively, we would expect that th...
Troy Raeder, Marina Blanton, Nitesh V. Chawla, Kei...
MASCOTS
2001
14 years 11 months ago
An Evaluation of Grouping Techniques for State Dissemination in Networked Multi-User Games
In a distributed multi-user game, entities need to communicate their state information to other entities. Usually only a subset of the game's entities are interested in infor...
Li Zou, Mostafa H. Ammar, Christophe Diot
MOBISYS
2007
ACM
15 years 9 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
ECUMN
2007
Springer
15 years 4 months ago
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Maryline Laurent-Maknavicius
VLDB
1994
ACM
84views Database» more  VLDB 1994»
15 years 1 months ago
A Transaction Replication Scheme for a Replicated Database with Node Autonomy
Many proposed protocols for replicated databases consider centralized control of each transaction so that given a transaction, some site will monitor the remote data access and tr...
Ada Wai-Chee Fu, David Wai-Lok Cheung